Search results

1 – 10 of 745
Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smartdevices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 6 February 2017

Heetae Yang, Hwansoo Lee and Hangjung Zo

The purpose of this paper is to develop a comprehensive research model that can explain potential customers’ behavioral intentions to adopt and use smart home services.

8699

Abstract

Purpose

The purpose of this paper is to develop a comprehensive research model that can explain potential customers’ behavioral intentions to adopt and use smart home services.

Design/methodology/approach

This study proposes and validates a new theoretical model that extends the theory of planned behavior. Partial least squares analysis is employed to test the research model and corresponding hypotheses on data collected from 216 survey samples.

Findings

Mobility, security/privacy risk, and trust in the service provider are important factors affecting the adoption of smart home services.

Practical implications

To increase potential users’ adoption rate, service providers should focus on developing mobility-related services that enable people to access smart home services while on the move using mobile devices via control and monitoring functions.

Originality/value

This study is the first empirical attempt to examine user acceptance of smart home services, as most of the prior literature has concerned technical features.

Details

Industrial Management & Data Systems, vol. 117 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 18 April 2023

Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…

Abstract

Purpose

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.

Design/methodology/approach

Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.

Findings

While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.

Originality/value

The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6243

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 2 December 2009

Kevin Doughty and Joanna Clark

Domestic violence is a threat to the well‐being of many families in the UK, and a great burden on health, social care and police resources. Its management requires swift action…

Abstract

Domestic violence is a threat to the well‐being of many families in the UK, and a great burden on health, social care and police resources. Its management requires swift action either to protect the victims in their own homes, or to move them to more appropriate accommodation where the perpetrators will be unable to find and harm them. However, the risk of violence often remains and requires some immediate action and access to support services on a 24‐hour basis. Special call lines have been created both at national and at local level, but these are not always suitable when there is a risk of the perpetrator being aware of such communications. Telecare offers a more sophisticated and responsive way of managing the risks, and is becoming popular with local authorities across the country. While basic systems using alarm pendants to raise an alert are popular with most authorities, the addition of smart sensors and the use of video monitoring can both be used to good effect. In the future, it may be assumed that a much wider range of telecare devices will be deployed to provide automatic detection of problems, and to ensure that victims of abuse are protected appropriately both in their homes and in other locations. Most local authorities use at least some elements of telecare, but there may be considerable potential for improving support by including a greater level of technology, some of which could be provided through Supporting People programmes or through the police.

Details

Journal of Assistive Technologies, vol. 3 no. 4
Type: Research Article
ISSN: 1754-9450

Keywords

Article
Publication date: 5 March 2021

Chuloh Jung, Jihad Awad and Afaq Chohan

This paper aims to optimize the smart elderly housing planning with IoT (internet of things) technologies for an aging society in Dubai. To reflect the IoT technologies in the…

Abstract

Purpose

This paper aims to optimize the smart elderly housing planning with IoT (internet of things) technologies for an aging society in Dubai. To reflect the IoT technologies in the elderly housing, the characteristics of the IoT home network devices, applied to Ajman University (AU) testbed and smart services model with the IoT technologies are thoroughly analyzed.

Design/methodology/approach

To extract the optimal smart elderly housing model in Dubai, the Korean smart home model from smart cities in Korea was used to implement the testbed at AU. In total, 100 users survey had been performed to adjust the Korean model to local culture/context.

Findings

It was analyzed that convenience and functionality are factors that must be provided. The security system was pointed out as a common denominator for future enhancements. When IoT technologies are applied to elderly housing, it should focus on the safety and health management of the elderly.

Social implications

Dubai had announced a strategy to transform into a Smart City in 2014 and the strategy had included 100 initiatives. The base unit of smart homes, however, was not covered and furthermore as society grows older, the priority for IoT technologies application in the smart home should be focused on smart elderly housing, as the elderly is equivalent to the handicapped due to deteriorated physical abilities.

Originality/value

The characteristics of the IoT home network devices applied to the AU testbed and smart services model with the IoT technologies are thoroughly analyzed.

Details

Open House International, vol. 46 no. 4
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 1 April 2001

Kevin Doughty and Gareth Williams

The use of telecare with appropriate domiciliary care packages may provide the means to manage many of the risks associated with the increasing number of older people who wish to…

Abstract

The use of telecare with appropriate domiciliary care packages may provide the means to manage many of the risks associated with the increasing number of older people who wish to continue to live independently in their own homes. Those who become especially frail or disabled can retain their independence and quality of life if their homes are made ‘smart’. This paper discusses the range of services that are available, or under development, for the prototype ‘MIDAS’ (Modular Intelligent Domiciliary Alarm System) telecare system, which enable traditional community alarm, telecare and assistive technologies to be used in an integrated and intelligent fashion. A range of services that allow autonomous operation within the home (and hence increase the perceived independence of a client by decreasing the reliance on a response centre operator) known as ‘HAMISH’ may be used. It offers a wider range of cost‐effective services of relevance to both the individual, and to society, in different types of home environment including dispersed housing and new sheltered housing schemes.

Details

Quality in Ageing and Older Adults, vol. 2 no. 1
Type: Research Article
ISSN: 1471-7794

Keywords

Abstract

Details

The Emerald Handbook of Computer-Mediated Communication and Social Media
Type: Book
ISBN: 978-1-80071-598-1

Article
Publication date: 17 June 2011

Kevin Doughty

This paper seeks to describe how the special built‐in features of modern smart phones can be used to open up the potential of these devices for use as assistive technologies in…

3740

Abstract

Purpose

This paper seeks to describe how the special built‐in features of modern smart phones can be used to open up the potential of these devices for use as assistive technologies in supporting the independence and quality of life of vulnerable people.

Design/methodology/approach

The paper describes, through a number of relevant examples, how low‐cost, downloadable applications enable the camera, the microphone, the accelerometer, the GPS receiver and the touch‐screen, to be used for specific assistive purposes.

Findings

Smart phones and their applications are capable of providing useful support to a range of vulnerable groups including people with sensory disabilities, diabetics and people suffering from mental health problems, epilepsy or communication issues. It is likely that mobile care services using smart phones will be offered in tandem with home telecare services to extend the independence of the service user from the home to the outside environment.

Originality/value

The paper demonstrates how smart phone applications are capable of transforming a high‐performance mobile phone into a number of different assistive devices that can improve the lives of millions of people with and without disability.

Details

Journal of Assistive Technologies, vol. 5 no. 2
Type: Research Article
ISSN: 1754-9450

Keywords

1 – 10 of 745